Sciweavers

6506 search results - page 1149 / 1302
» Algorithmic models for sensor networks
Sort
View
145
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
141
Voted
ANOR
2011
96views more  ANOR 2011»
14 years 10 months ago
Global propagation of side constraints for solving over-constrained problems
This article deals with the resolution of over-constrained problems using constraint programming, which often imposes to add to the constraint network new side constraints. These ...
Thierry Petit, Emmanuel Poder
145
Voted
SIGIR
2011
ACM
14 years 6 months ago
Time-based query performance predictors
Query performance prediction is aimed at predicting the retrieval effectiveness that a query will achieve with respect to a particular ranking model. In this paper, we study quer...
Nattiya Kanhabua, Kjetil Nørvåg
153
Voted
TON
2010
157views more  TON 2010»
14 years 10 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
126
Voted
DSN
2007
IEEE
15 years 10 months ago
Electing an Eventual Leader in an Asynchronous Shared Memory System
This paper considers the problem of electing an eventual leader in an asynchronous shared memory system. While this problem has received a lot of attention in messagepassing syste...
Antonio Fernández, Ernesto Jiménez, ...
« Prev « First page 1149 / 1302 Last » Next »